A cyber attack is a malicious attack conducted by cybercriminals against a single or multiple computers, networks, or infrastructure with the intention of disabling/destroying the target computers, stealing/exposing data, gaining unauthorized administrative access, or using the targeted computer as a launch point for other attacks.

Cybercriminals attack through deploying several methods including malware/ransomware/spyware dropping, phishing campaigns, Denial of Service attacks, zero-day exploits, Man-in-the-Middle attacks, Cryptojacking, SQL injection, and DNS tunneling.

Cybercriminals, individuals or teams, have various motives for committing attacks; the most relevant ones include financial gain, theft of intellectual property, making a political statement, gaining fame, and revenge.

who has created this mobile remote access Trojan?

mobile remote access Trojan that sells Android users information for $ 30

The mobile remote access Trojan reached the gates of the Android world. Researchers have warned Android users of the risk of exfiltration of their information, such as photos, locations, contacts, and messages from popular apps such as Facebook, Instagram, WhatsApp, Skype, Telegram, Kik, Line, and Google Messages. This danger is derived from a second threat…

Hardware security keys under the attack

Hardware security keys under the attack, Google titan security in question

While too many people still don’t know anything about Hardware security keys, such as those from Google and Yubico, Companies are trying to introduce them as the most secure hardware ever. Although these tools are highly resistant to phishing and takeover attacks, the new attacks could let hackers Clone Hardware security keys. An electromagnetic side-channel…